![Fakulta informatiky on Twitter: "Petr Švenda z #fimuni prosí o pomoc při výzkumu bezpečnosti kryptografického hardware. Postup je na https://t.co/TsYlhtAGiw. Děkujeme! https://t.co/deGSYIBPPM" / Twitter Fakulta informatiky on Twitter: "Petr Švenda z #fimuni prosí o pomoc při výzkumu bezpečnosti kryptografického hardware. Postup je na https://t.co/TsYlhtAGiw. Děkujeme! https://t.co/deGSYIBPPM" / Twitter](https://pbs.twimg.com/media/C0IsTcMWQAEjzpY.jpg)
Fakulta informatiky on Twitter: "Petr Švenda z #fimuni prosí o pomoc při výzkumu bezpečnosti kryptografického hardware. Postup je na https://t.co/TsYlhtAGiw. Děkujeme! https://t.co/deGSYIBPPM" / Twitter
![Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you](https://pbs.twimg.com/media/Eo-PtHUW4AQ4b6s.png)
Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you
![Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you](https://pbs.twimg.com/media/Eo-PtGpXIA4Th1g.png)
Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you
![PV204 Security technologies Rootkits, reverse engineering of binary applications, whitebox model Petr Švenda Faculty. - ppt download PV204 Security technologies Rootkits, reverse engineering of binary applications, whitebox model Petr Švenda Faculty. - ppt download](https://images.slideplayer.com/39/10847829/slides/slide_3.jpg)
PV204 Security technologies Rootkits, reverse engineering of binary applications, whitebox model Petr Švenda Faculty. - ppt download
![PV204 Security technologies File and disk encryption Milan Brož Petr Švenda Faculty of Informatics, Masaryk University. - ppt download PV204 Security technologies File and disk encryption Milan Brož Petr Švenda Faculty of Informatics, Masaryk University. - ppt download](https://images.slideplayer.com/39/10834276/slides/slide_2.jpg)
PV204 Security technologies File and disk encryption Milan Brož Petr Švenda Faculty of Informatics, Masaryk University. - ppt download
![PV204 Security technologies Rootkits, reverse engineering of binary applications, whitebox model Petr Švenda Faculty. - ppt download PV204 Security technologies Rootkits, reverse engineering of binary applications, whitebox model Petr Švenda Faculty. - ppt download](https://images.slideplayer.com/39/10847829/slides/slide_2.jpg)
PV204 Security technologies Rootkits, reverse engineering of binary applications, whitebox model Petr Švenda Faculty. - ppt download
![PV204 Security technologies File and disk encryption Milan Brož Petr Švenda Faculty of Informatics, Masaryk University. - ppt download PV204 Security technologies File and disk encryption Milan Brož Petr Švenda Faculty of Informatics, Masaryk University. - ppt download](https://images.slideplayer.com/39/10834276/slides/slide_3.jpg)
PV204 Security technologies File and disk encryption Milan Brož Petr Švenda Faculty of Informatics, Masaryk University. - ppt download
![PV204 Security technologies File and disk encryption Milan Brož Petr Švenda Faculty of Informatics, Masaryk University. - ppt download PV204 Security technologies File and disk encryption Milan Brož Petr Švenda Faculty of Informatics, Masaryk University. - ppt download](https://images.slideplayer.com/39/10834276/slides/slide_4.jpg)
PV204 Security technologies File and disk encryption Milan Brož Petr Švenda Faculty of Informatics, Masaryk University. - ppt download
![PA193 - Secure coding principles and practices Language level vulnerabilities: Buffer overflow, type overflow, strings Petr Švenda - ppt download PA193 - Secure coding principles and practices Language level vulnerabilities: Buffer overflow, type overflow, strings Petr Švenda - ppt download](https://slideplayer.com/10886049/39/images/slide_1.jpg)
PA193 - Secure coding principles and practices Language level vulnerabilities: Buffer overflow, type overflow, strings Petr Švenda - ppt download
![Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you Petr Svenda on Twitter: "More TPMs we can scan, better insight into TPM ecosystem we all will have. And you will learn a lot about your specific chip as well! Thank you](https://pbs.twimg.com/media/Eo-PtHsXUAAnB47.png)